freebsd_ipfw.c 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359
  1. // SPDX-License-Identifier: GPL-3.0-or-later
  2. #include "plugin_freebsd.h"
  3. #include <netinet/ip_fw.h>
  4. #define FREE_MEM_THRESHOLD 10000 // number of unused chunks that trigger memory freeing
  5. #define COMMON_IPFW_ERROR() collector_error("DISABLED: ipfw.packets chart"); \
  6. collector_error("DISABLED: ipfw.bytes chart"); \
  7. collector_error("DISABLED: ipfw.dyn_active chart"); \
  8. collector_error("DISABLED: ipfw.dyn_expired chart"); \
  9. collector_error("DISABLED: ipfw.mem chart");
  10. // --------------------------------------------------------------------------------------------------------------------
  11. // ipfw
  12. int do_ipfw(int update_every, usec_t dt) {
  13. (void)dt;
  14. #if __FreeBSD__ >= 11
  15. static int do_static = -1, do_dynamic = -1, do_mem = -1;
  16. if (unlikely(do_static == -1)) {
  17. do_static = config_get_boolean("plugin:freebsd:ipfw", "counters for static rules", 1);
  18. do_dynamic = config_get_boolean("plugin:freebsd:ipfw", "number of dynamic rules", 1);
  19. do_mem = config_get_boolean("plugin:freebsd:ipfw", "allocated memory", 1);
  20. }
  21. // variables for getting ipfw configuration
  22. int error;
  23. static int ipfw_socket = -1;
  24. static ipfw_cfg_lheader *cfg = NULL;
  25. ip_fw3_opheader *op3 = NULL;
  26. static socklen_t *optlen = NULL, cfg_size = 0;
  27. // variables for static rules handling
  28. ipfw_obj_ctlv *ctlv = NULL;
  29. ipfw_obj_tlv *rbase = NULL;
  30. int rcnt = 0;
  31. int n, seen;
  32. struct ip_fw_rule *rule;
  33. struct ip_fw_bcounter *cntr;
  34. int c = 0;
  35. char rule_num_str[12];
  36. // variables for dynamic rules handling
  37. caddr_t dynbase = NULL;
  38. size_t dynsz = 0;
  39. size_t readsz = sizeof(*cfg);;
  40. int ttype = 0;
  41. ipfw_obj_tlv *tlv;
  42. ipfw_dyn_rule *dyn_rule;
  43. uint16_t rulenum, prev_rulenum = IPFW_DEFAULT_RULE;
  44. unsigned srn, static_rules_num = 0;
  45. static size_t dyn_rules_num_size = 0;
  46. static struct dyn_rule_num {
  47. uint16_t rule_num;
  48. uint32_t active_rules;
  49. uint32_t expired_rules;
  50. } *dyn_rules_num = NULL;
  51. uint32_t *dyn_rules_counter;
  52. if (likely(do_static | do_dynamic | do_mem)) {
  53. // initialize the smallest ipfw_cfg_lheader possible
  54. if (unlikely((optlen == NULL) || (cfg == NULL))) {
  55. optlen = reallocz(optlen, sizeof(socklen_t));
  56. *optlen = cfg_size = 32;
  57. cfg = reallocz(cfg, *optlen);
  58. }
  59. // get socket descriptor and initialize ipfw_cfg_lheader structure
  60. if (unlikely(ipfw_socket == -1))
  61. ipfw_socket = socket(AF_INET, SOCK_RAW, IPPROTO_RAW);
  62. if (unlikely(ipfw_socket == -1)) {
  63. collector_error("FREEBSD: can't get socket for ipfw configuration");
  64. collector_error("FREEBSD: run netdata as root to get access to ipfw data");
  65. COMMON_IPFW_ERROR();
  66. return 1;
  67. }
  68. bzero(cfg, 32);
  69. cfg->flags = IPFW_CFG_GET_STATIC | IPFW_CFG_GET_COUNTERS | IPFW_CFG_GET_STATES;
  70. op3 = &cfg->opheader;
  71. op3->opcode = IP_FW_XGET;
  72. // get ifpw configuration size than get configuration
  73. *optlen = cfg_size;
  74. error = getsockopt(ipfw_socket, IPPROTO_IP, IP_FW3, op3, optlen);
  75. if (error)
  76. if (errno != ENOMEM) {
  77. collector_error("FREEBSD: ipfw socket reading error");
  78. COMMON_IPFW_ERROR();
  79. return 1;
  80. }
  81. if ((cfg->size > cfg_size) || ((cfg_size - cfg->size) > sizeof(struct dyn_rule_num) * FREE_MEM_THRESHOLD)) {
  82. *optlen = cfg_size = cfg->size;
  83. cfg = reallocz(cfg, *optlen);
  84. bzero(cfg, 32);
  85. cfg->flags = IPFW_CFG_GET_STATIC | IPFW_CFG_GET_COUNTERS | IPFW_CFG_GET_STATES;
  86. op3 = &cfg->opheader;
  87. op3->opcode = IP_FW_XGET;
  88. error = getsockopt(ipfw_socket, IPPROTO_IP, IP_FW3, op3, optlen);
  89. if (error) {
  90. collector_error("FREEBSD: ipfw socket reading error");
  91. COMMON_IPFW_ERROR();
  92. return 1;
  93. }
  94. }
  95. // go through static rules configuration structures
  96. ctlv = (ipfw_obj_ctlv *) (cfg + 1);
  97. if (cfg->flags & IPFW_CFG_GET_STATIC) {
  98. /* We've requested static rules */
  99. if (ctlv->head.type == IPFW_TLV_TBLNAME_LIST) {
  100. readsz += ctlv->head.length;
  101. ctlv = (ipfw_obj_ctlv *) ((caddr_t) ctlv +
  102. ctlv->head.length);
  103. }
  104. if (ctlv->head.type == IPFW_TLV_RULE_LIST) {
  105. rbase = (ipfw_obj_tlv *) (ctlv + 1);
  106. rcnt = ctlv->count;
  107. readsz += ctlv->head.length;
  108. ctlv = (ipfw_obj_ctlv *) ((caddr_t) ctlv + ctlv->head.length);
  109. }
  110. }
  111. if ((cfg->flags & IPFW_CFG_GET_STATES) && (readsz != *optlen)) {
  112. /* We may have some dynamic states */
  113. dynsz = *optlen - readsz;
  114. /* Skip empty header */
  115. if (dynsz != sizeof(ipfw_obj_ctlv))
  116. dynbase = (caddr_t) ctlv;
  117. else
  118. dynsz = 0;
  119. }
  120. if (likely(do_mem)) {
  121. static RRDSET *st_mem = NULL;
  122. static RRDDIM *rd_dyn_mem = NULL;
  123. static RRDDIM *rd_stat_mem = NULL;
  124. if (unlikely(!st_mem)) {
  125. st_mem = rrdset_create_localhost("ipfw",
  126. "mem",
  127. NULL,
  128. "memory allocated",
  129. NULL,
  130. "Memory allocated by rules",
  131. "bytes",
  132. "freebsd.plugin",
  133. "ipfw",
  134. NETDATA_CHART_PRIO_IPFW_MEM,
  135. update_every,
  136. RRDSET_TYPE_STACKED
  137. );
  138. rrdset_flag_set(st_mem, RRDSET_FLAG_DETAIL);
  139. rd_dyn_mem = rrddim_add(st_mem, "dynamic", NULL, 1, 1, RRD_ALGORITHM_ABSOLUTE);
  140. rd_stat_mem = rrddim_add(st_mem, "static", NULL, 1, 1, RRD_ALGORITHM_ABSOLUTE);
  141. }
  142. rrddim_set_by_pointer(st_mem, rd_dyn_mem, dynsz);
  143. rrddim_set_by_pointer(st_mem, rd_stat_mem, *optlen - dynsz);
  144. rrdset_done(st_mem);
  145. }
  146. static RRDSET *st_packets = NULL, *st_bytes = NULL;
  147. RRDDIM *rd_packets = NULL, *rd_bytes = NULL;
  148. if (likely(do_static || do_dynamic)) {
  149. if (likely(do_static)) {
  150. if (unlikely(!st_packets)) {
  151. st_packets = rrdset_create_localhost("ipfw",
  152. "packets",
  153. NULL,
  154. "static rules",
  155. NULL,
  156. "Packets",
  157. "packets/s",
  158. "freebsd.plugin",
  159. "ipfw",
  160. NETDATA_CHART_PRIO_IPFW_PACKETS,
  161. update_every,
  162. RRDSET_TYPE_STACKED
  163. );
  164. }
  165. if (unlikely(!st_bytes)) {
  166. st_bytes = rrdset_create_localhost("ipfw",
  167. "bytes",
  168. NULL,
  169. "static rules",
  170. NULL,
  171. "Bytes",
  172. "bytes/s",
  173. "freebsd.plugin",
  174. "ipfw",
  175. NETDATA_CHART_PRIO_IPFW_BYTES,
  176. update_every,
  177. RRDSET_TYPE_STACKED
  178. );
  179. }
  180. }
  181. for (n = seen = 0; n < rcnt; n++, rbase = (ipfw_obj_tlv *) ((caddr_t) rbase + rbase->length)) {
  182. cntr = (struct ip_fw_bcounter *) (rbase + 1);
  183. rule = (struct ip_fw_rule *) ((caddr_t) cntr + cntr->size);
  184. if (rule->rulenum != prev_rulenum)
  185. static_rules_num++;
  186. if (rule->rulenum > IPFW_DEFAULT_RULE)
  187. break;
  188. if (likely(do_static)) {
  189. sprintf(rule_num_str, "%"PRIu32"_%"PRIu32"", (uint32_t)rule->rulenum, (uint32_t)rule->id);
  190. rd_packets = rrddim_find_active(st_packets, rule_num_str);
  191. if (unlikely(!rd_packets))
  192. rd_packets = rrddim_add(st_packets, rule_num_str, NULL, 1, 1, RRD_ALGORITHM_INCREMENTAL);
  193. rrddim_set_by_pointer(st_packets, rd_packets, cntr->pcnt);
  194. rd_bytes = rrddim_find_active(st_bytes, rule_num_str);
  195. if (unlikely(!rd_bytes))
  196. rd_bytes = rrddim_add(st_bytes, rule_num_str, NULL, 1, 1, RRD_ALGORITHM_INCREMENTAL);
  197. rrddim_set_by_pointer(st_bytes, rd_bytes, cntr->bcnt);
  198. }
  199. c += rbase->length;
  200. seen++;
  201. }
  202. if (likely(do_static)) {
  203. rrdset_done(st_packets);
  204. rrdset_done(st_bytes);
  205. }
  206. }
  207. // go through dynamic rules configuration structures
  208. if (likely(do_dynamic && (dynsz > 0))) {
  209. if ((dyn_rules_num_size < sizeof(struct dyn_rule_num) * static_rules_num) ||
  210. ((dyn_rules_num_size - sizeof(struct dyn_rule_num) * static_rules_num) >
  211. sizeof(struct dyn_rule_num) * FREE_MEM_THRESHOLD)) {
  212. dyn_rules_num_size = sizeof(struct dyn_rule_num) * static_rules_num;
  213. dyn_rules_num = reallocz(dyn_rules_num, dyn_rules_num_size);
  214. }
  215. bzero(dyn_rules_num, sizeof(struct dyn_rule_num) * static_rules_num);
  216. dyn_rules_num->rule_num = IPFW_DEFAULT_RULE;
  217. if (dynsz > 0 && ctlv->head.type == IPFW_TLV_DYNSTATE_LIST) {
  218. dynbase += sizeof(*ctlv);
  219. dynsz -= sizeof(*ctlv);
  220. ttype = IPFW_TLV_DYN_ENT;
  221. }
  222. while (dynsz > 0) {
  223. tlv = (ipfw_obj_tlv *) dynbase;
  224. if (tlv->type != ttype)
  225. break;
  226. dyn_rule = (ipfw_dyn_rule *) (tlv + 1);
  227. bcopy(&dyn_rule->rule, &rulenum, sizeof(rulenum));
  228. for (srn = 0; srn < (static_rules_num - 1); srn++) {
  229. if (dyn_rule->expire > 0)
  230. dyn_rules_counter = &dyn_rules_num[srn].active_rules;
  231. else
  232. dyn_rules_counter = &dyn_rules_num[srn].expired_rules;
  233. if (dyn_rules_num[srn].rule_num == rulenum) {
  234. (*dyn_rules_counter)++;
  235. break;
  236. }
  237. if (dyn_rules_num[srn].rule_num == IPFW_DEFAULT_RULE) {
  238. dyn_rules_num[srn].rule_num = rulenum;
  239. dyn_rules_num[srn + 1].rule_num = IPFW_DEFAULT_RULE;
  240. (*dyn_rules_counter)++;
  241. break;
  242. }
  243. }
  244. dynsz -= tlv->length;
  245. dynbase += tlv->length;
  246. }
  247. static RRDSET *st_active = NULL, *st_expired = NULL;
  248. RRDDIM *rd_active = NULL, *rd_expired = NULL;
  249. if (unlikely(!st_active)) {
  250. st_active = rrdset_create_localhost("ipfw",
  251. "active",
  252. NULL,
  253. "dynamic_rules",
  254. NULL,
  255. "Active rules",
  256. "rules",
  257. "freebsd.plugin",
  258. "ipfw",
  259. NETDATA_CHART_PRIO_IPFW_ACTIVE,
  260. update_every,
  261. RRDSET_TYPE_STACKED
  262. );
  263. }
  264. if (unlikely(!st_expired)) {
  265. st_expired = rrdset_create_localhost("ipfw",
  266. "expired",
  267. NULL,
  268. "dynamic_rules",
  269. NULL,
  270. "Expired rules",
  271. "rules",
  272. "freebsd.plugin",
  273. "ipfw",
  274. NETDATA_CHART_PRIO_IPFW_EXPIRED,
  275. update_every,
  276. RRDSET_TYPE_STACKED
  277. );
  278. }
  279. for (srn = 0; (srn < (static_rules_num - 1)) && (dyn_rules_num[srn].rule_num != IPFW_DEFAULT_RULE); srn++) {
  280. sprintf(rule_num_str, "%d", dyn_rules_num[srn].rule_num);
  281. rd_active = rrddim_find_active(st_active, rule_num_str);
  282. if (unlikely(!rd_active))
  283. rd_active = rrddim_add(st_active, rule_num_str, NULL, 1, 1, RRD_ALGORITHM_ABSOLUTE);
  284. rrddim_set_by_pointer(st_active, rd_active, dyn_rules_num[srn].active_rules);
  285. rd_expired = rrddim_find_active(st_expired, rule_num_str);
  286. if (unlikely(!rd_expired))
  287. rd_expired = rrddim_add(st_expired, rule_num_str, NULL, 1, 1, RRD_ALGORITHM_ABSOLUTE);
  288. rrddim_set_by_pointer(st_expired, rd_expired, dyn_rules_num[srn].expired_rules);
  289. }
  290. rrdset_done(st_active);
  291. rrdset_done(st_expired);
  292. }
  293. }
  294. return 0;
  295. #else
  296. collector_error("FREEBSD: ipfw charts supported for FreeBSD 11.0 and newer releases only");
  297. COMMON_IPFW_ERROR();
  298. return 1;
  299. #endif
  300. }